PROVEST: Provenance-based Trust Model for Delay Tolerant Networks

Slides:



Advertisements
Similar presentations
Mobility Entropy and Message Routing in Community-Structured Delay Tolerant Networks Hideya Ochiai Hiroshi Esaki The University of Tokyo / NICT Asia Future.
Advertisements

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Presented by: Vijay Kumar.
Supporting Cooperative Caching in Disruption Tolerant Networks
Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks Reference: Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Sergio Marti, T.J. Giuli,
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
1 Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Yu-Ta Chen 2006 Advanced Wireless Network.
A Probabilistic Misbehavior Detection Scheme towards Efficient Trust Establishment in Delay-tolerant Networks Haojin Zhu, Suguo Du, Zhaoyu Gao, Mianxiong.
An Optimal Probabilistic Forwarding Protocol in Delay Tolerant Networks Chan-Myung Kim
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
NGMAST- WMS workshop17/09/2008, Cardiff, Wales, UK A Simulation Analysis of Routing Misbehaviour in Mobile Ad hoc Networks 2 nd International Conference.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Trust Management in Mobile Ad Hoc Networks Using a Scalable Maturity-Based Model Authors: Pedro B. Velloso, Rafael P. Laufer, Daniel de O. Cunha, Otto.
Integrated Social and Quality of Service Trust Management of Mobile Groups in Ad Hoc Networks Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho Communications.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Hierarchical Trust Management for Wireless Sensor Networks and Its Application to Trust-Based Routing Fenye Bao, Ing-Ray Chen, Moonjeong Chang Presented.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
1 Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection Fenye Bao, Ing-Ray Chen,
Routing In Socially Selfish Delay Tolerant Networks Chan-Myung Kim
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Group 3 Sandeep Chinni Arif Khan Venkat Rajiv. Delay Tolerant Networks Path from source to destination is not present at any single point in time. Combining.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
A Novel Multicast Routing Protocol for Mobile Ad Hoc Networks Zeyad M. Alfawaer, GuiWei Hua, and Noraziah Ahmed American Journal of Applied Sciences 4:
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Quality of System requirements 1 Performance The performance of a Web service and therefore Solution 2 involves the speed that a request can be processed.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Research into the hybridization of the PRoPHET and ERP network routing algorithms George Mason University INFS 612 (Spring 2013) Project Group 4: Richard.
SRL: A Bidirectional Abstraction for Unidirectional Ad Hoc Networks. Venugopalan Ramasubramanian Ranveer Chandra Daniel Mosse.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
The EigenTrust Algorithm for Reputation Management in P2P Networks
A Security Framework with Trust Management for Sensor Networks Zhiying Yao, Daeyoung Kim, Insun Lee Information and Communication University (ICU) Kiyoung.
Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection Wenhai Sun & Ruide Zhang.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks Tanya Roosta (EECS, Berkeley) In Collaboration With: Sameer Pai (ECE, Cornell)
EEC 688/788 Secure and Dependable Computing Lecture 10 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
SPIN: Sensor Protocols for Information via Negotiation
William Stallings Data and Computer Communications
Presented by Edith Ngai MPhil Term 3 Presentation
Author:Zarei.M.;Faez.K. ;Nya.J.M.
TAODV: A Trusted AODV Routing Protocol for MANET
A Location-Based Routing Method for Mobile Ad Hoc Networks
Delay-Tolerant Networks (DTNs)
Trust-based Service Composition and Binding with Multiple Objective Optimization in Service- Oriented Mobile Ad Hoc Networks Yating Wang†, Ing-Ray Chen†,
Feng Li, Jie Wu, Avinash Srinivasan
Introduction to Wireless Sensor Networks
The Beta Reputation System
Mobile Ad hoc Network: Secure Issues In Multi-Hop Routing Protocols
Presented by Prashant Duhoon
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Environment-Aware Reputation Management for Ad Hoc Networks
Transport Layer Unit 5.
En Wang 1,2 , Yongjian Yang 1 , and Jie Wu 2
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
Path key establishment using multiple secured paths in wireless sensor networks CoNEXT’05 Guanfeng Li  University of Pittsburgh, Pittsburgh, PA Hui Ling.
ITIS 6010/8010 Wireless Network Security
Witness-based Detection of Forwarding Misbehavior in Wireless Networks
PROVEST: Provenance-based Trust Model for Delay Tolerant Networks
Routing.
Delay-Tolerant Mobile Ad-hoc Networks
EEC 688/788 Secure and Dependable Computing
EEC 688/788 Secure and Dependable Computing
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks IEEE Infocom
Presentation transcript:

PROVEST: Provenance-based Trust Model for Delay Tolerant Networks Jin-Hee Cho, Ing-Ray Chen

1. Introduction Introduction | Method | Evaluation

What is Disruption Tolerant Networks (DTN) There is no guarantee of end-to-end connectivity, thus causing high delay or disruption due to inherent characteristics or intentionally misbehaving nodes Examples: smart environments, habitat monitoring, and vehicular ad- hoc networks

What do we expect DTN behaves Achieve accurate peer-to-peer trust assessment Maximize the delivery of correct messages received by destination nodes Minimizing message delay and communication cost under resource- constrained network environments

A challenge Nodes are sparsely scattered in DTN and do not often encounter each other The lack of direct interaction experience in DTN environments hinders continuous evidence collection and can result in incorrect trust estimation, leading to poor application performance.

Provenance “lineage” or “pedigree,” Describing the origins of a piece of data and how the data achieves the current state Can be think as another communication method, an indirect method

Challenge of using provenance It must defend against attackers who may modify or drop messages including provenance information or disseminate fake information

Network model Information: source nodes (SNs) ==> destination node (DNs) “store-and-forward” technique: a node carries messages until it encounters a message carrier (MC)

2. Method Introduction | Method | Evaluation

PI (SN) ==> destination node (DN) Pi;k representing the PI provided by i with its direct trust opinion towards the previous MC = Oi;k(t) is I’s direct trust opinion towards the attack behaviors (i.e., ID, fake recommendation, and message modification attacks), and remaining energy level of k

Peer-to-peer trust estimation r: amount of positive evidence s: amount of negative evidence initiated with r = 1 and s = 1 Derived from either: direct evidence based on observations or indirect evidence (PI)

Uncertainty of evidence - u Direct evidence: can be failed due to unreliable link or short contact time Indirect evidence: false evidence will not be used. Three scores: r, s, u Accumulated evidence from the past and new evidence How to aggregate?

Trust Aggregation PROVEST-Pessimistic PROVEST-Optimistic PROVEST-Realistic PROVEST-Hybrid The value of each trust dimension is aggregated based on accumulated evidence from the past and the new evidence

PROVEST-Pessimistic Treats uncertain evidence as negative evidence based on the nature of trusting less under no correct evidence available i to refer to a trustor (i.e., evaluator) and j to refer to a trustee (i.e., evaluatee).

PROVEST-Optimistic Treats uncertainty as credits based on the nature of trusting more

PROVEST-Realistic Only relies on evidence available by ignoring the uncertain evidence If no new evidence is available, it does not update trust

PROVEST-Hybrid Leveraging the three schemes above It determines how to deal with uncertain evidence based on historical patterns of the amount of evidence

Trust Dimensions Availability Direct trust Integrity Indirect trust × Competence Direct trust Indirect trust ×

Direct availability trust Direct availability trust is measured by whether a node is available to serve requests by exchanging a simple message to ensure connectivity. Replies: (1,0,0) No replies: (0,1,0)

Direct integrity trust Direct integrity trust is measured based on whether a node exhibits three attack behaviors: identity attack, fake recommendation attack, and message modification attack Each exhibiting attack behavior is counted as evidence r+s+u=3

Direct competence trust Energy status + cooperativeness behavior r+s+u=2

Indirect availability trust Positive (1,0,0) if (1) node j’s ID is enclosed in j’s PI; (2) node j’s ID is authentic by ensuring that j’s ID inserted by j in j’s PI matches with j’s ID inserted by j’s next MC in the next PI; (3) both j’s previous MC and j have a trust value above the minimum trust threshold based on i’s evaluation

Indirect integrity trust Also three pieces of evidence: identity attack, fake recommendation attack, and message modification attack If PI is inserted: j’s next MC’s trust value (in the last trust update) > threshold For each evidence r+s+u=3

Indirect competence trust Also energy status + cooperativeness behavior If PI is inserted: j’s next MC’s trust value (in the last trust update) > threshold For each evidence r+s+u=2

3. Evaluation Introduction | Method | Evaluation

Metrics - Trust Bias Time-averaged difference between: trust of node j evaluated by node i and objective trust of node j evaluated by all encountered nodes based on direct observations with no detection errors. ground truth Trust value of node j on property X evaluated by node i at time t

Metrics - Mission message correctness Fraction of the number of packets received by DNs correctly over the total number of messages transmitted by SNs during LT. I is a set of messages received by DNs and the k nodes are intermediate MCs delivering message m. m: message K is a set of all intermediate MCs involved in delivering each message m.

Metrics - Message delay Dm is the delay (sec.) occurred for message m to be delivered to the DN. I is a set of messages sent by SNs to DNs

Metrics - Communication cost Ce(t): number of messages for a node to deal with trust evaluation Cd(t): number of messages for a node to deal with message delivery LT: entire mission lifetime

Experimental Setup 20 nodes Communication range: 100m Speed: uniform distribution with the range of [1,15] Packet forwarding probability: Pf Packet dropping probability: 1-Pf Number of SN-DN pairs: 20 And so on

STOCHASTIC PETRI NETS

Trust Bias of PROVEST

Performance of PROVEST

Comparing methods Trust-based Non-trust-based PROVEST (and its variants) Encounter-based Iterative Trust Reputation Mechanism (ITRM) Non-trust-based epidemic (e.g., flooding) ProPHET (e.g., connectivity-based delivery prediction)

Comparing Results We found that the provenance-based approach (i.e., PROVEST-Hybrid) significantly reduces the communication cost while maintaining a high correct message delivery ratio, compared to Epidemic, ITRM, Encounter-based, and PRoPHET

Conclusion Direct method Intrinsic properties of DTN: Two methods Indirect method (PI) 1. Sparse nodes 2. Various attacks Introduce u Four variants 3. no guarantee connectivity 4. Inherent problems Three dimensions

Thank you